Behavioral task
behavioral1
Sample
b9d9a2dbe1091cde1204883fd0ac631bd4d8de6b09e9010ca051f2dfcaf450eb.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b9d9a2dbe1091cde1204883fd0ac631bd4d8de6b09e9010ca051f2dfcaf450eb.xls
Resource
win10v2004-20240802-en
General
-
Target
b9d9a2dbe1091cde1204883fd0ac631bd4d8de6b09e9010ca051f2dfcaf450eb
-
Size
679KB
-
MD5
ec731dd9c56f7dff7c43e3ca1b429d43
-
SHA1
4f9a58d6381053ae9a7a110d4a3772d5f3c21ee4
-
SHA256
b9d9a2dbe1091cde1204883fd0ac631bd4d8de6b09e9010ca051f2dfcaf450eb
-
SHA512
2f24d047d7f5a0b49ca13fdb45d06166c413ec36d4ee647b52ea2cdc0a4dd2ab56e14c9f23512c5a436a6173d431196d6d4c54f79c871b885cf6413dd4e7809f
-
SSDEEP
6144:1pmjV22STDvEX1BZXUMh9FzrT/39IqEMtIlHiK6m57Xp:+pSTDshEmeqLyl33
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b9d9a2dbe1091cde1204883fd0ac631bd4d8de6b09e9010ca051f2dfcaf450eb.xls windows office2003
Kangatang
Kangatang_2
Kangatang_3
Kangatang_4
Kangatang_5
Kangatang_6
Kangatang_7
Kangatang_8
Kangatang_9
Kangatang_10
Kangatang_11
Kangatang_12
Kangatang_13
Kangatang_14
Kangatang_15
Kangatang_16
Kangatang_17
Kangatang_18
Kangatang_19
Kangatang_20
Kangatang_21
Kangatang_22
Kangatang_23
Kangatang_24
Kangatang_25
Kangatang_26
Kangatang_27
Kangatang_28
Kangatang_29
Kangatang_30
Kangatang_31
Kangatang_32
Kangatang_33
Kangatang_34
Kangatang_35
Kangatang_36
Kangatang_37
Kangatang_38
Kangatang_39
Kangatang_40
Kangatang_41
Kangatang_42
Kangatang_43
Kangatang_44
Kangatang_45
Kangatang_46
Kangatang_47
Kangatang_48
Kangatang_49
Kangatang_50
Kangatang_51
Kangatang_52
Kangatang_53
Kangatang_54
Kangatang_55
Kangatang_56
Kangatang_57
Kangatang_58
Kangatang_59
Kangatang_60
Kangatang_61
Kangatang_62
Kangatang_63
Kangatang_64
Kangatang_65
Kangatang_66
Kangatang_67
Kangatang_68
Kangatang_69
Kangatang_70
Kangatang_71
Kangatang_72
Kangatang_73